1. About Your Organisation
Please answer the questions below so we can classify your organisation.
|
|
| |
|
|
|
Please indicate the nature of your organisation below. |
| |
|
|
|
| Please briefly describe your principal business activity. | | |
|
|
|
2. About You
Please indicate the nature of your job role, so we can classify survey responses.
|
|
| |
|
|
|
3. Computer Asset Classification and Control
Does your organisation keep records on the hardware and software that it uses? Please tick those items which apply.
Question Explanation |
|
|
|
|
4. Risk Management
Does your organisation conduct formal risk management?
|
|
| |
|
|
If you conduct formal information security risk management process please tick those items which apply.
Question Explanation |
|
|
|
|
5. Information Security Policy
Does your organisation have a formal (i.e. written) information security policy?
|
|
| |
|
|
If you have an information security policy who was involved in its development? Please tick all that apply.
|
|
| |
|
|
|
|
Does your organisation have a nominated individual (or individuals) with responsibility for information security?
|
|
| |
|
|
|
6. Personnel Security
Please indicate how strongly you agree or disagree with the following statements.
Question Explanation |
|
|
|
|
7. Physical and Environmental Security
Please indicate how well or badly your organisation tackles the following aspects of physical security.
Question Explanation |
|
|
|
Which of the following physical or environmental security controls does your organisation a) Have in Place or b) Aspire To? Please tick all that apply.
Question Explanation |
|
|
|
|
8. Secure Computer Management
Which of the following secure computer management procedures does your organisation have in place? Please tick all that apply.
|
|
Documented Operating Procedures
Do you have documented operating procedures that address: Question Explanation |
| |
|
|
|
|
9. Secure Systems Development
Does your organisation develop software systems or write programs?
|
|
| |
|
|
If your organisation develops systems or writes programs which of the following development procedures are used? Please tick all that apply.
|
|
| |
|
|
|
|
10. Access Control
Which of the following access control procedures have been adopted by your organisation use? Please tick all that apply.
|
|
| |
|
|
|
|
11. Encryption and Authentication Technologies
Which of the following encryption or authentication technologies are used by your organisation?
Question Explanation |
|
|
|
|
|
|
13. Survey Completed
This completes the survey. Thank-you for your time and responses.
A sample of survey respondents will be invited to participate in more detailed research.
Would you be interested in participating?
|
|
| |
|
|
|